One year reflection paper

  1. What have you learned about yourself over the past year?
  2. What did you learn about working in teams over the past year?
  3. What skills and abilities have you learned over the past year that has improved your abilities to solve problems?

template to be followed attached.

Refer to DBA course structure to write points on past year learned skills. 

1) Include points on PBL

2) ADP experience

3) marketing strategies

4) identifying problems and solutions

5) testing scenarios

cover letter.

write a cover letter based on the attached documents, pay attention to the instruction. If You are being ask to write Cover letter of the attached internship document. Make the cover letter and spiritual statement.  

  • Cover Letter describing      your interest in an IJM Internship or Fellowship
  • Statement of Faith (if not      addressed in cover letter. Please share about what your faith means to you      and how it has inspired you to take part in the work of IJM).

 

6- MODULE-VIEW-CONTROLLER DESIGN TECHNIQUE

Which component of this technique will you be incorporating into this week’s programming assignment? (JAVA SWING and Reverse Polish (HP) Style)

need resources and APA

https://www.guru99.com/java-swing-gui.html
so this means just to view the URL and comment on the Reverse Polish and if its good or not

The examPLE is attached. 

Project Schedule

Complete a Project Schedule.

This is a required assignment, worth 45 points and must be submitted by the due date.  Late assignments will not be accepted.

Details on the Project: IT Project Specifications v2.pdf

Use this project schedule template for the assignment: IT Project Schedule template.xlsx

When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 

Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and paste information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.

Submit your solution here.

The following is an example of a Project Schedule: Project Schedule Example.pdf

MemoryGame

 Memory Game. A 4×4 and 6×6 memory game using “visuals” and “audio”. User will remember the location visual and audio clues. In the audio mode, there is no graphic will be presented to the user. Audio files randomly are randomly scattered over grid, like visual mode. Player touches a cell and hear an audio, then memorize its location to find its pair. The game will have a countdown timer, and keeps best score permanently. Collection view API will be utilized. App has two levels of game, 4×4 and 6×6 grid. User selects game mode and game size. Audio/visual component is required, i.e., appropriate sound and appropriate  visual presentation. 

Linux System Scan

  

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open-source research using the internet. Roughly, what is the cost to license Nessus for one year?

Discussion

1- Please share your thoughts how we can protect our Network from Cyber Attacks? (short answer)

2- Please define and explain about Network Security Tools, how Network need to be protected by Cyber Attacks 

Computer and network security

 

  1. What things do you think to make up the Web?
  2. When arriving at a crime scene, is it better to shut down the computer immediately or insure it stays on? What are the tradeoffs?